ANS Documentation

Improve This Doc
  • Cloud
  • Domains and DNS management
  • Backup and High Availability
  • eCommerce Stacks
  • Security
    • DDoSX®
    • Web Application Firewall
    • Threat Monitoring and Threat Response
      • General Information and FAQs
      • How does it work?
      • System Requirements
      • Getting Started
      • Installing on a UKFast hosted server
      • Installing on a non-UKFast hosted server
      • PCI DSS Compliance
      • Alerts and rulesets
      • Attack Ruleset
      • High Level Alerts Explained
      • Alert Remediation Tips
      • Common Attacks
      • Databases
      • Exploits
      • File Monitoring (FIM)
      • Malware
      • Service Specific Alerts
      • System
      • Windows
      • Scans and Reconnaissance
    • McAfee Antivirus
    • Vulnerability Scans
    • ANS MDR
    • Keeping Magento secure
    • Keeping WordPress secure
    • Brute Force Attacks
    • CryptoLocker
    • Dirty COW
    • The Logjam attack
    • Meltdown and Spectre
    • Memcached security concerns and reflection/amplification DDoS attacks
    • Wana Decryptor / Wana Decrypt0r 2.0 / WannaCry
    • Log4J Vulnerability
    • Polkit Security Vulnerability CVE-2021-4034
    • CVE-2022-0847 - Dirty Pipe Vulnerability
  • Email
  • Monitoring and usage management
  • Networking
  • Operating systems
  • Webcelerator
  • MyUKFast
  • Home >
  • Security >
  • Threat Monitoring and Threat Response >
  • Attack Ruleset >
  • Web Application Specific Attacks

Web Application Specific Attacks¶

Many attacks are targeted to exploit a known vulnerability in a specific web application like Word Press, Magneto or Joomla. These attacks have a higher likelihood of being successful, as they tend to specifically exploit known weaknesses in these applications. UKFast Threat Monitoring can detect common attacks and block the source IP address via a host-based firewall.

osCommerce login bypass¶

Signatures detected

Triggered when the URL request contains any of the flowing patterns:

Patterns are separated by a |

URL Contains: login.php

Regex: POST /\S+.php/login.php?cPath=

Severity

Threat Monitoring will classify this attack as a high, triggering the source IP address to be blocked using the below methods. As this attack is not severe, an alert will not be sent out via email, however, these attacks will still show up in dashboards in your MyUKFast.

Remediation and Blocking

Should a high-level attack be detected, Threat Monitoring will block the source IP address using a host-based firewall, IPTables (Linux) or Windows firewall for 30 minutes.

osCommerce file manager bypass¶

Signatures detected

Triggered when the URL request contains any of the flowing patterns:

Patterns are separated by a |

URL Contains: login.php

Regex: /admin/\w+.php/login.php

Severity

Threat Monitoring will classify this attack as a high, triggering the source IP address to be blocked using the below methods. As this attack is not severe, an alert will not be sent out via email, however, these attacks will still show up in dashboards in your MyUKFast.

Remediation and Blocking

Should a high-level attack be detected, Threat Monitoring will block the source IP address using a host-based firewall, IPTables (Linux) or Windows firewall for 30 minutes.

Uploadify Exploit¶

Signatures detected

Triggered when the URL request contains any of the flowing patterns:

Patterns are separated by a |

URL Contains: uploadify.php

Regex: GET /\S+/uploadify.php?src=http://\S+.php

Severity

Threat Monitoring will classify this attack as a high, triggering the source IP address to be blocked using the below methods. As this attack is not severe, an alert will not be sent out via email, however, these attacks will still show up in dashboards in your MyUKFast.

Remediation and Blocking

Should a high-level attack be detected, Threat Monitoring will block the source IP address using a host-based firewall, IPTables (Linux) or Windows firewall for 30 minutes.

BBS delete.php Exploit¶

Signatures detected

Triggered when the URL request contains any of the flowing patterns:

Patterns are separated by a |

URL Contains: delete.php

Regex: GET \S+/delete.php?board_skin_path=http://\S+.php

Severity

Threat Monitoring will classify this attack as a high, triggering the source IP address to be blocked using the below methods. As this attack is not severe, an alert will not be sent out via email, however, these attacks will still show up in dashboards in your MyUKFast.

Remediation and Blocking

Should a high-level attack be detected, Threat Monitoring will block the source IP address using a host-based firewall, IPTables (Linux) or Windows firewall for 30 minutes.

Simple shell.php Command Usage¶

Signatures detected

Triggered when the URL request contains any of the flowing patterns:

Patterns are separated by a |

URL Contains: shell.php

Regex: GET \S+/shell.php?cmd=

Severity

Threat Monitoring will classify this attack as a high, triggering the source IP address to be blocked using the below methods. As this attack is not severe, an alert will not be sent out via email, however, these attacks will still show up in dashboards in your MyUKFast.

Remediation and Blocking

Should a high-level attack be detected, Threat Monitoring will block the source IP address using a host-based firewall, IPTables (Linux) or Windows firewall for 30 minutes.

PHPMyAdmin Setup Scans¶

Signatures detected

Triggered when the URL request contains any of the flowing patterns:

Patterns are separated by a |

URL Contains: phpMyAdmin/scripts/setup.php

Severity

Threat Monitoring will classify this attack as a high, triggering the source IP address to be blocked using the below methods. As this attack is not severe, an alert will not be sent out via email, however, these attacks will still show up in dashboards in your MyUKFast.

Remediation and Blocking

Should a high-level attack be detected, Threat Monitoring will block the source IP address using a host-based firewall, IPTables (Linux) or Windows firewall for 30 minutes.

Suspicious URLs¶

Signatures detected

Triggered when the URL request contains any of the flowing patterns:

Patterns are separated by a |

URL Contains: .swp$ | .bak$ | /.htaccess | /server-status | /.ssh | /.history | /wallet.dat

Severity

Threat Monitoring will classify this attack as a high, triggering the source IP address to be blocked using the below methods. As this attack is not severe, an alert will not be sent out via email, however, these attacks will still show up in dashboards in your MyUKFast.

Remediation and Blocking

Should a high-level attack be detected, Threat Monitoring will block the source IP address using a host-based firewall, IPTables (Linux) or Windows firewall for 30 minutes.

High amount of POST Requests¶

Signatures detected

Triggered when the URL request contains any of the flowing patterns:

Patterns are separated by a |

Request Type: POST

Frequency: 16

Time frame: 20

Severity

Threat Monitoring will classify this attack as a high, triggering the source IP address to be blocked using the below methods. As this attack is not severe, an alert will not be sent out via email, however, these attacks will still show up in dashboards in your MyUKFast.

Remediation and Blocking

Should a high-level attack be detected, Threat Monitoring will block the source IP address using a host-based firewall, IPTables (Linux) or Windows firewall for 30 minutes.

Anomaly URL query (attempting to pass null termination).¶

Signatures detected

Triggered when the URL request contains any of the flowing patterns:

Patterns are separated by a |

URL Contains: %00

Regex: "GET /\S+.php?\S+%00

Severity

Threat Monitoring will classify this attack as a high, triggering the source IP address to be blocked using the below methods. As this attack is not severe, an alert will not be sent out via email, however, these attacks will still show up in dashboards in your MyUKFast.

Remediation and Blocking

Should a high-level attack be detected, Threat Monitoring will block the source IP address using a host-based firewall, IPTables (Linux) or Windows firewall for 30 minutes.

Timthumb Exploit¶

Signatures detected

Triggered when the URL request contains any of the flowing patterns:

Patterns are separated by a |

URL Contains: thumb.php | timthumb.php

Regex: GET \S+thumb.php?src=\S+.php

Severity

Threat Monitoring will classify this attack as a high, triggering the source IP address to be blocked using the below methods. As this attack is not severe, an alert will not be sent out via email, however, these attacks will still show up in dashboards in your MyUKFast.

Remediation and Blocking

Should a high-level attack be detected, Threat Monitoring will block the source IP address using a host-based firewall, IPTables (Linux) or Windows firewall for 30 minutes.

Timthumb Backdoor Access¶

Signatures detected

Triggered when the URL request contains any of the flowing patterns:

Patterns are separated by a |

Regex: GET /\S+cart.php?\S+templatefile=../

URL Contains: DECLARE%20@S%20CHAR|%20AS%20CHAR

Severity

Threat Monitoring will classify this attack as a high, triggering the source IP address to be blocked using the below methods. As this attack is not severe, an alert will not be sent out via email, however, these attacks will still show up in dashboards in your MyUKFast.

Remediation and Blocking

Should a high-level attack be detected, Threat Monitoring will block the source IP address using a host-based firewall, IPTables (Linux) or Windows firewall for 30 minutes.

Next Article > WordPress

  • Useful Links
  • SMB
  • Enterprise
  • Channel
  • Public Sector
  • ANS Data Centres
  • About ANS
  • Careers
  • Blog
  • Get in touch
  •  
  • Sales 0800 458 4545
  • Support 0800 230 0032
  • Get in touch

© ANS Group Limited | Terms and Conditions | Corporate Guidance | Sitemap
ANS Group Limited, registered in England and Wales, company registration number 03176761, registered office 1 Archway, Birley Fields, Manchester M15 5QJ